06.09.2021 Views

Torts - Cases, Principles, and Institutions Fifth Edition, 2016a

Torts - Cases, Principles, and Institutions Fifth Edition, 2016a

Torts - Cases, Principles, and Institutions Fifth Edition, 2016a

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Witt & Tani, TCPI 2. Intentional Harms<br />

phrase “virtual reality,” which would suggest that any real property “located” in “cyberspace”<br />

must be “virtually real” property. Metaphor is a two-edged sword.<br />

Indeed, the metaphorical application of real property rules would not, by itself, transform<br />

a physically harmless electronic intrusion on a computer server into a trespass. That is because,<br />

under California law, intangible intrusions on l<strong>and</strong>, including electromagnetic transmissions, are<br />

not actionable as trespasses (though they may be as nuisances) unless they cause physical damage<br />

to the real property. (San Diego Gas & Electric Co. v. Superior Court (1996) 13 Cal.4th 893,<br />

936–937, 55 Cal.Rptr.2d 724, 920 P.2d 669.) Since Intel does not claim Hamidi’s electronically<br />

transmitted messages physically damaged its servers, it could not prove a trespass to l<strong>and</strong> even<br />

were we to treat the computers as a type of real property. Some further extension of the conceit<br />

would be required, under which the electronic signals Hamidi sent would be recast as tangible<br />

intruders, perhaps as tiny messengers rushing through the “hallways” of Intel’s computers <strong>and</strong><br />

bursting out of employees’ computers to read them Hamidi’s missives. But such fictions promise<br />

more confusion than clarity in the law. . . .<br />

The plain fact is that computers, even those making up the Internet, are—like such older<br />

communications equipment as telephones <strong>and</strong> fax machines—personal property, not realty.<br />

Professor Epstein observes that “[a]lthough servers may be moved in real space, they cannot be<br />

moved in cyberspace,” because an Internet server must, to be useful, be accessible at a known<br />

address. But the same is true of the telephone: to be useful for incoming communication, the<br />

telephone must remain constantly linked to the same number (or, when the number is changed, the<br />

system must include some forwarding or notification capability, a qualification that also applies to<br />

computer addresses). Does this suggest that an unwelcome message delivered through a<br />

telephone or fax machine should be viewed as a trespass to a type of real property? We think not:<br />

As already discussed, the contents of a telephone communication may cause a variety of injuries<br />

<strong>and</strong> may be the basis for a variety of tort actions (e.g., defamation, intentional infliction of<br />

emotional distress, invasion of privacy), but the injuries are not to an interest in property, much<br />

less real property, <strong>and</strong> the appropriate tort is not trespass.<br />

More substantively, Professor Epstein argues that a rule of computer server inviolability<br />

will, through the formation or extension of a market in computer-to-computer access, create “the<br />

right social result.” In most circumstances, he predicts, companies with computers on the Internet<br />

will continue to authorize transmission of information through e-mail, Web site searching, <strong>and</strong><br />

page linking because they benefit by that open access. When a Web site owner does deny access<br />

to a particular sending, searching, or linking computer, a system of “simple one-on-one<br />

negotiations” will arise to provide the necessary individual licenses.<br />

Other scholars are less optimistic about such a complete propertization of the Internet.<br />

Professor Mark Lemley . . . writing on behalf of an amici curiae group of professors of intellectual<br />

property <strong>and</strong> computer law, observes that under a property rule of server inviolability, “each of<br />

the hundreds of millions of [Internet] users must get permission in advance from anyone with<br />

whom they want to communicate <strong>and</strong> anyone who owns a server through which their message<br />

may travel.” The consequence for e-mail could be a substantial reduction in the freedom of<br />

electronic communication, as the owner of each computer through which an electronic message<br />

passes could impose its own limitations on message content or source. . . .<br />

A leading scholar of internet law <strong>and</strong> policy, Professor Lawrence Lessig . . . , has<br />

criticized Professor Epstein’s theory of the computer server as quasi-real property . . . on the<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!